]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commit
libpcre2 : Follow up fix CVE-2022-1586
authorShinu Chandran <shinucha@cisco.com>
Fri, 6 Oct 2023 19:13:45 +0000 (00:43 +0530)
committerSteve Sakoman <steve@sakoman.com>
Fri, 6 Oct 2023 22:00:50 +0000 (12:00 -1000)
commit7e2fe508b456207fd991ece7621ef8ba24b89e59
tree8d9f31939cc4dea88ca88153f18439d1328755c9
parent22d2c549ba6d8be137d1d290d9a04691ca1858f2
libpcre2 : Follow up fix CVE-2022-1586

CVE-2022-1586 was originally fixed by OE commit
https://github.com/openembedded/openembedded-core/commit/7f4daf88b71f
through libpcre2 commit
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e672

The follow up patch is required to resolve a bug in the initial fix[50a51cb7e672]
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc3

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
https://security-tracker.debian.org/tracker/CVE-2022-1586

Signed-off-by: Shinu Chandran <shinucha@cisco.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-support/libpcre/libpcre2/CVE-2022-1586-regression.patch [new file with mode: 0644]
meta/recipes-support/libpcre/libpcre2_10.34.bb